Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32953: CWE-303: Incorrect Implementation of Authentication Algorithm in tillitis tkeyclient

0
Medium
VulnerabilityCVE-2026-32953cvecve-2026-32953cwe-303
Published: Fri Mar 20 2026 (03/20/2026, 04:24:12 UTC)
Source: CVE Database V5
Vendor/Project: tillitis
Product: tkeyclient

Description

CVE-2026-32953 is a medium severity vulnerability in the tillitis tkeyclient Go package versions 1. 2. 0 and below. The flaw causes 1 in 256 User Supplied Secrets (USS) to be silently ignored due to a buffer index error, resulting in the same Compound Device Identifier (CDI) and key material as if no USS was provided. This undermines the authentication algorithm by effectively discarding USS values whose hash starts with 0x00. The issue does not require authentication or user interaction but has limited impact due to the low probability of the hash starting with zero. The vulnerability has been fixed in version 1. 3. 0, and users unable to upgrade should select USS values whose hash does not begin with zero. No known exploits are reported in the wild at this time.

AI-Powered Analysis

AILast updated: 03/20/2026, 05:10:08 UTC

Technical Analysis

The vulnerability identified as CVE-2026-32953 affects the tillitis tkeyclient Go package, specifically versions 1.2.0 and earlier. The tkeyclient module implements a TKey client that relies on User Supplied Secrets (USS) to generate a Compound Device Identifier (CDI), which is critical for key material derivation and authentication. Due to a buffer index error in the code, the boolean flag indicating whether a USS is enabled is overwritten by the first byte of the USS digest. Consequently, if the hash of the USS begins with the byte 0x00, the USS is silently ignored, causing the system to generate the same CDI as if no USS was supplied. This results in a collision where different USS inputs produce identical key material, undermining the authentication mechanism's integrity. The flaw is subtle and probabilistic, affecting approximately 1 out of every 256 USS inputs. The vulnerability does not require any privileges or user interaction to be triggered, but exploitation depends on the USS hash starting with zero. The issue has been addressed in version 1.3.0 of the tkeyclient package. Until upgrading is feasible, users are advised to avoid USS values whose hash begins with 0x00 to mitigate the risk. No public exploits have been reported, and the CVSS 4.7 score reflects a medium severity with partial impact on confidentiality, integrity, and availability, and a requirement for local access (AV:P).

Potential Impact

This vulnerability can lead to key collisions where distinct User Supplied Secrets produce identical Compound Device Identifiers and key material. For organizations relying on tillitis tkeyclient for secure authentication and key derivation, this undermines the integrity of the authentication process and could allow unauthorized access or key reuse scenarios. The silent nature of the flaw means it may go unnoticed, potentially weakening security guarantees without detection. However, the impact is limited by the low probability (approximately 0.39%) of a USS hash starting with 0x00 and the requirement for local or network access to exploit. Systems that depend heavily on unique USS values for device identity or cryptographic operations may face increased risk of impersonation or key compromise. The vulnerability does not appear to affect availability directly but could degrade trust in cryptographic operations and authentication workflows. Since no known exploits are reported, the immediate risk is moderate, but organizations should prioritize patching to prevent future exploitation.

Mitigation Recommendations

The primary mitigation is to upgrade the tillitis tkeyclient package to version 1.3.0 or later, where the buffer index error has been corrected. For organizations unable to upgrade immediately, a practical workaround is to ensure that User Supplied Secrets produce hashes that do not start with the byte 0x00. This can be achieved by pre-screening USS inputs or applying a transformation to avoid zero-leading hashes. Additionally, implement monitoring to detect unexpected key collisions or authentication anomalies that may indicate exploitation attempts. Review and audit cryptographic key derivation processes to ensure no other similar logic errors exist. Incorporate secure coding practices and fuzz testing in development to catch buffer and index errors early. Finally, maintain an inventory of systems using the vulnerable tkeyclient versions and prioritize patch deployment in environments with high security requirements.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T00:05:53.285Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcd2fce32a4fbe5f2df425

Added to database: 3/20/2026, 4:54:20 AM

Last enriched: 3/20/2026, 5:10:08 AM

Last updated: 3/20/2026, 7:13:24 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses